|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2011-11-18 13:00 |
Tokushima |
Naruto University of Education |
On the possibility of detecting zero-day exploits contained in malware Chiaki Jimbo, Kousuke Murakami, Takayoshi Fujii, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2011-32 |
In order to launch highly organized cyber attacks, human attackers utilize automated programs, namely, malware, to effic... [more] |
ICSS2011-32 pp.1-6 |
ICSS |
2010-11-05 16:25 |
Hiroshima |
Hiroshima City University |
A Shellcode Analysis Method using CPU emulator and Dynamic Binary Instrumentation Chiaki Jimbo, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (Yokohama National Univ.), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2010-54 |
The epidemic of Conficker shows that remote exploit attack is still one of the most serious threats on the computer syst... [more] |
ICSS2010-54 pp.59-64 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|